Information security ultimately depends on identifying and applying available security features appropriately. This course discusses the development of a secure information infrastructure consisting of servers, networks, firewalls, workstations and intrusion detection systems. It also covers principles and practice related to secure operation of existing distributed systems.
Principles of penetration testing for assessment of system security are also addressed. This course will also cover network security management systems that gather and analyze information to identify possible security breaches. It includes intrusions (attacks from outside the organization) and misuse (attacks from within the organization). Students learn the use of vulnerability assessment and scanning technologies to determine the security of a network.
- Grasp General Security Concepts
- Recognize threats
- Build defenses
- Be aware of attack vectors and trends
- Identify methods of cyber exploitations and social engineering
- Identify Network Traffic and Protocol Analysis (Normal vs Abnormal)
- Be familiar with popular tools
- Use IDS hardware and software
- Decode/interpret tcp, udp, Ip and packet payloads
- Base line your network
- Create a Network Secure Architecture (Defense in Depth)
- Put an IDS place in the plan - Explore and configure host and network IDS
- Complete an IDS Signature Design
- Write vendor neutral signature design
- Build SNORT signatures
- Incident Response
- Collecting evidence
- Lessons learned
YOUR OPPORTUNITY: You will learn how to use a variety of tools that monitor an organization's IT infrastructure for threats, and you will understand how these tools work so that you can appreciate and address their limitations.
Take the Next Step
Learn more about Lewis University's online programs. Call (866) 967-7046 to speak with a Graduate Admissions Counselor or click here to request more information.